Skip to search formSkip to main contentSkip to account menu

Deniable authentication

Known as: Repudiability (cryptography), Repudiation (cryptography) 
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Scientific workflows play an important role in computational research, as the essential artifacts for communicating the methods… 
2010
2010
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to… 
2009
2009
Email used to be the "number one killer application" of the Internet. However, misuse and abuse such as spam, phishing, and… 
2008
2008
A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication… 
2007
2007
Deniable authentication protocol was studied in this paper.Based on the intractability of discrete logarithm problem and secure… 
2006
2006
Tel: 886+(0)5-2721001 ext.2017 Abstract Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols… 
2005
2005
A deniable authentication scheme using RSA is described and proven secure in the random oracle model. A countermeasure to a well… 
2005
2005
Deniable authentication protocol is an authentication protocol that allows a sender to authenticate a message for a receiver, in… 
Review
2004
Review
2004
RSA keys form the cornerstone for numerous security systems. They provide for confidentiality of communications as well as non… 
Highly Cited
2002
Highly Cited
2002
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure…